The
Internet has revolutionized business, but
with any revolution comes new risks. Nothing
is impenetrable; it is no longer enough
to deploy security products and hope for
the best. It takes highly-trained experts
and sophisticated technology to stay ahead
of today's software vulnerabilities, malicious
insiders, and increasingly sophisticated
hackers.

It doesn't take a genius to realise that
you only have to have one computer or
network within your company, to be at
risk. This risk presents various security
threats. If your computer or network is
connected to the Internet you are at even
more risk.

If you have suffered any form of breach
of security, virus attack, network intrusion
etc, you should contact us today. We perform
an in-depth and granular analysis of your
company network, security policies, firewalls,
operating system configurations from desktop
to server, Internet access policies and
assess any current and future threats.
With this information in hand we will
establish an effective and comprehensive
security policy for your organisation.

Virus Threats

The "Inside
Job"

Hacking

Software Vulnerabilities

Platform Holes

Physical Security

Virus Threats
According to the International Computer Security
Association (ICSA), there are well over 3,000,000
viruses in existence and over 200 new ones appearing
almost monthly. In addition the average cost of
virus infections in companies was estimated by
the ICSA last year in Europe alone was estimated
at over 8,000,000 euro and yet 30 to 40 percent
of companies still have not implemented any perimeter
virus protection. In the past, 90% of viruses
were obtained through the use of "floppy
disks" yet in more recent times over 90%
of infections enter a computer by email, internet
downloads and hostile web sites and only about
1% from floppy disk infections. The most common
threat being e-mail worms in recent years. So
many companies think they are safe by simply buying
an anti-virus product and installing it and that's
it ... it is frightening how many companies do
not bother to ever update their anti-virus definitions
which should be done from once a day to once a
week depending on the anti-virus software they
purchased. That alone is not going to save you
from today's virus threats. An effective virus
scanning system will utilise more than one anti-virus
product, ie. so if a virus escapes one virus scanner
it will be caught by the other, as you can probably
see a trend developing here, you can imagine that
some networks out there use even 3 or more virus
scanners along with various content filtering
solutions on their e-mail systems. For the latest
virus threat information visit the Symantec Anti
Virus Research Centre.

The Inside Job
It is more often than not that a disgruntled employee
with all the keys and passwords to your network
will cause total havoc the day you decide to dismiss
them. The threat of this happening to any company
with sensitive information is "very"
real. This happens to hundreds of companies every
year but often to avoid embarrassment this information
is carefully kept away from the press. Companies
who have experienced such "inside jobs"
simply did not establish effective company policies
over who has access to what and what happens when
someone with high levels of access needs to be
dismissed.

Software Vulnerabilities
Each and every piece of software has it's bugs
and along with it's bugs a host of potential vulnerabilities.
There are thousands of expert coders and those
young hackers that are recently being dubbed 'script
kiddies' out there that are continually looking
for flaws in software and often new flaws are
discovered, news gets out on the Internet and
in a very short period of time, companies and
individuals have been hit by the exploit.

Platform Holes
This is a very real problem in today's world.
However a system that is effectively locked down
and secured correctly can prevent such exploits
from being run in the first place. Simply loading
an operating system, applying the vendor patches
and fixes etc will not guarantee you any level
of security. There are many methods and practices
of locking down computers that text-books and
tutoring simply do not discuss and as a result
poor security practices get implemented each and
every day only to get their flaws proven soon
after.

So How Can We Help You?
If you have suffered any form of breach of security,
virus attack, network intrusion etc, you should
contact us today. We take an in-depth look at
the status of your company network, security policies,
firewalls, operating system configurations from
desktop to server, Internet access policies and
assess any current and future threats. With this
information in hand we will establish an effective
security policy for your company, configure and
lockdown your desktops and servers, re-design
firewall implementations, implement IPSEC policies,
configure data encryption of sensitive company
data, configure virus scanning with automatic
updates which get pushed to your servers and desktops,
re-configure mail servers with virus scanning
of incoming and outgoing mail, implement content
scanning of all Internet and E-mail activity and
set up of continuous security auditing. We get
you back to focusing on what you do best, looking
after your core business.